Tuesday, 5 September 2006
09:00 – 09:10 Opening – Welcome
Simone Fischer-Huebner, Steven Furnell, Costas Lambrinoudakis
09:10 – 10:00 Keynote TrustBus’06
Chair: Simone Fischer-Huebner
Privacy Practices and Economics - From Privacy Policies to Privacy SLAs
Invited talk by Günter Karjoth, IBM Research - Zurich
10:00 – 11:00 Session 1: Privacy and Identity Management
Chair: Günther Pernul
Towards Scalable Management of Privacy Obligations in Enterprises
Marco Casassa Mont
A new User-centric Identity Management Infrastructure for Federated Systems
Vassilis Poursalidis, Christos Nikolaou
11:00 – 11:30 Coffee Break
11:30 – 12:30 Keynote EC-Web
12:30 – 14:00 Lunch
14:00 – 15:30 Session 2: Security and Risk Management
Chair: Costas Lambrinoudakis
Information Security Risk Assessment Model for Risk Management
Dariusz Wawrzyniak
On the Limits of Cyber-Insurance
Rainer Böhme, Gaurav Kataria
Towards a Risk Management Perspective on AAIs
Christian Schläger, Thomas Nowey
15:30 – 16:00 Coffee Break
16:00 – 17:30 Session 3: Security Requirements and Development
Chair: Marco Casassa Mont
Towards a UML 2.0 Extension for the Modeling of Security Requirements in Business Processes
Alfonso Rodríguez, Eduardo Fernández-Medina, Mario Piattini
A Framework for Exploiting Security Expertise in Application Development
Theodoros Balopoulos, Lazaros Gymnopoulos, Maria Karyda, Spyros Kokolakis, Stefanos Gritzalis, Sokratis Katsikas
On Diffusion and Confusion – Why Electronic Signatures Have Failed
Heiko Roßnagel
Wednesday, 6 September 2006
09:00 – 11:00 Session 4: Privacy Enhancing Technologies and Privacy Management
Chair: Leszek T. Lilien
Extending P3P to Facilitate Proxies which Pose as a Potential Threat to Privacy
Wesley Brandi, Martin S Olivier
A Systematic Approach to Privacy Enforcement and Policy Compliance Checking in Enterprises
Marco Casassa Mont, Siani Pearson, Robert Thyne
A Generic Privacy Enhancing Technology for Pervasive Computing Environments
Stelios Dritsas, John Tsaparas, Dimitris Gritzalis
Bringing the User Back into Control: A New Paradigm for Usability in Highly Dynamic Systems
Sebastian Höhn
11:00 – 11:30 Coffee Break
11:30 – 12:30 Keynote TrustBus’06
Chair: Steven Furnell
Building the Information Assurance Community of Purpose
Invited talk by Jeremy Ward, Symantec EMEA
12:30 – 14:00 Lunch
14:00 – 15:30 Panel Discussion “Is security without Trust Feasible ?”
Chair: Leszek T. Lilien, Department of Computer Science, Western Michigan University, USA
Panelists:
Bharat Bhargava, Department of Computer Sciences, Purdue University, West Lafayette, Indiana, USA.
Simone Fischer-Hübner, Department of Computer Science, Karlstad University, Karlstad, Sweden
Sanjay Madria, Department of Computer Science, University of Missouri-Rolla, Rolla, Missouri, USA.
Krzysztof Zieliński, Department of Computer Science, AGH University of Science and Technology, Kraków (Cracow), Poland
15:30 – 16:00 Coffee Break
16:00 – 17:30 Session 5: Access Control Models
Chair: Jeremy Ward
Extending SQL to Allow the Active Usage of Purposes
Wynand van Staden, Martin S Olivier
FGAC-QD: Fine-Grained Access Control Model based on Query Decomposition Strategy
Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
A Framework for Modeling Restricted Delegation in Service Oriented Architecture
Muhammad Alam, Michael Hafner, Ruth Breu, Stefan Unterthiner
Thursday, 7 September 2006
09:00 – 11:00 Session 6: Trust and Reputation
Chair: Martin S. Olivier
Reputation-based Trust Systems for P2P Applications: Design Issues and Comparison Framework
Eleni Koutrouli , Aphrodite Tsalgatidou
Towards Trust in Digital Rights Management Systems
Jürgen Nützel, Anja Beyer
Cluster-based Analysis and Recommendation of Sellers in Online Auctions
Mikolaj Morzy, Juliusz Jezierski
Trust Model Architecture: Defining Prejudice by Learning
M. Wojcik, JHP. Eloff, HS. Venter
11:00 – 11:30 Coffee Break
11:30 – 12:30 Keynote DaWak
12:30 – 14:00 Lunch
14:00 – 15:30 Session 7: Security Protocols
Chair: Costas Lambrinoudakis
How to Protect a Signature from Being Shown to a Third Party
Marek Klonowski, Przemysław Kubiak, Mirosław Kutyłowski, Anna Lauks
Security Analysis and Improvement for Key Issuing Schemes in ID-based Cryptography
Saeran Kwon, Sang-Ho Lee
A Secure E-tender Submission Protocol
Rong Du, Colin Boyd, Ernest Foo
15:30 – 16:00 Coffee Break
16:00 – 17:00 Session 8: Security and Privacy in Mobile Environments
Chair: Christian Schlaeger
A Sophisticated Solution for Revealing Attacks on Wireless LAN
René Neumerkel, Stephan Groß
Information Leakage in Ubiquitous Voice-over-IP Communications
Thorsten Neumann, Heiko Tillwick, Martin S Olivier
17:00 – 17:10 Conference Closing
Simone Fischer-Huebner, Steven Furnell, Costas Lambrinoudakis